Meet With Our Analysts On-Site

Forrester forums offer unparalleled opportunities for face-to-face meetings with our best-in-class analysts & experts. Forum attendees can choose to meet with our analysts & experts one-on-one or in small groups, in order to explore individual issues and solutions.

Booking for onsite analyst & expert meetings opens on September 5. Registered attendees will be notified by email on how to book. All analyst & expert meetings are subject to change based on availability. For additional information about onsite analyst meetings, contact Hannah Mower.

 

Analysts & Experts

Alla Valente, Analyst
Coverage: Financial Services, Fintech, Governance Risk & Compliance (GRC), IT Governance, Information Security, Internet of Things (IoT), Risk Management, Software-As-A-Service (SaaS), and Vendor Management

Amy DeMartine, VP, Research Director
Coverage: API Security, Application Security, Continuous Delivery, Governance Risk & Compliance (GRC), Information Security, Security Architecture, Security Operations & Program Governance, and Vulnerability & Threat Management

Andras Cser, VP, Principal Analyst 
Coverage: Cloud Security, Customer Analytics, Customer Intelligence, Financial Management, Financial Services, Fraud Management, Governance Risk & Compliance (GRC), Healthcare, Identity & Access Management (IAM), Information Security, Internet of Things (IoT), and Single Sign-On (SSO)

Chase Cunningham, Principal Analyst 
Coverage: Antimalware, Data Breach Notifications & Incident Response, Encryption, Endpoint Security Government, Information Security, Network Security, Security Operations & Program Governance, and Zero Trust

Chris Gardner, Principal Analyst
Coverage: Cloud Computing, Data Center Infrastructure Management (DCIM), Development & Operations (DevOps), Infrastructure Architectures, and Software-Defined Data Center (SDDC)

David Holmes, Senior Analyst
Coverage: Security Analysis, Presentation, White Papers, Bylines, AWS, Python, Ansible and PostgresQL. Development Specialties Include: Secure Sockets (SSL), Public Key Infrastructure (PKI), Authentication and Authorization Systems. Kerberos, GSSAPI, C, C++, Java, MFC, Perl, PHP, Apache, UNIX Shell Scripts, 0x86 Assembly, Network Protocols, Attacks & Defenses, FIPS-140, RADIUS, LDAP

Elaine Hutton, Principal Consultant 
Coverage: Cloud Computing, Design Thinking, Employee Experience, Enterprise Architecture Domains & Practices, IT Service Management (ITSM), Innovation, Sourcing Strategy & Execution, Strategy & Strategic Planning, Technology, Vendor Management, and Workforce Enablement

Enza Iannopollo, Senior Analyst 
Coverage: Customer and Data Privacy, Privacy Best Practices, Data Ethics, Privacy Compliance, Data Protection Regulation and Standards, Governance and Data Management, Privacy Management Software, Data Discovery and Classification, De-identification Technology

Heidi Shey,  Principal Analyst
Coverage: Data & Information Protection, Data Breach Notifications & Incident Response, Data Classification, Data Discovery & Flow Mapping, Data Loss Prevention (DLP), Data Security, Encryption, Information Security, Privacy, Regulations & Legislation, Technology, and Zero Trust

Jessica Burn, Principal Advisor
Coverage: CISO/Security Leader Role & Priorities, Board & Executive Communication, Information Security/Risk Organizational & Reporting Structures, and Security Awareness & Training

 

Jinan Budge, Principal Analyst
Coverage: Security Awareness, Behavior, Culture, Strategy, CISO Leadership, Board & Executive Security Engagement, Security Program Management, Security Change Management, APAC Issues

Jeff Pollard, VP, Principal Analyst
Coverage:  API Security, Antimalware, Application Security, Data Breach Notifications & Incident Response, Endpoint Security, Managed Security Services Providers (MSSPs), Mobile Security, Security Architecture, Security Performance Management, and Software-As-A-Service (SaaS)

Joseph Blankenship, VP, Research Director 
Coverage: Artificial Intelligence (AI), Distributed Denial of Service (DDoS), Email Content Security, Information Security, Security Automation & Orchestration, Security Information & Event Management (SIEM), Security Operations & Program Governance, Technology, and Zero Trust

Josh Zelonis, Principal Analyst
Coverage: Antimalware, Architecture & Technology Strategy, Container Security, Data Breach Notifications & Incident Response, Endpoint Security, Firewalls, Information Security, Mobile Security, Network Security, Security Operations & Program Governance, Vulnerability & Threat Management, and Zero Trust

Ken Weitzel, VP, CIO Executive Partner
Coverage:  Business Innovation, IT Strategy, Organization & Role Development, and Service Model Deployment

Liz Witherspoon, Director, Principal Consultant
Coverage: Business Case Development, ROI Of Initiatives, Technology Investment Benefits, and Costs & Risks

Merritt Maxim, VP, Research Director 
Coverage: Authentication, Biometrics, Cloud Security, Encryption, Identity & Access Management (IAM), Information Security, Internet of Things (IoT), Passwords, Physical Security, Single Sign-On (SSO), and User Account Provisioning

Norman Forbush, Director, Total Economic Impact

Paul McKay, Senior Analyst 
Coverage:  Governance Risk & Compliance (GRC), Information Security, Managed Security Services Providers (MSSPs), Operating Models, Regulations & Legislation, Risk Management, Security Operations & Program Governance, and Security Performance Management

Peter Cerrato, Principal Consultant
Coverage: Artificial Intelligence (AI), Cloud Security, Data & Information Protection, Data Breach Notifications & Incident Response, Encryption, Energy & Utilities, Financial Services, Governance Risk & Compliance (GRC), Government, Information Security, Media & Entertainment, Network Security, Privacy, and Security Operations & Program Governance

Rudy Seber, Senior Consultant
Coverage: Organizational Change Management Regarding Security & Risk Initiatives, Working with Managed Security Service Providers (contractors), and Making Business Cases for Security & Risk

Trevor Thomas, Senior Consultant
Coverage: Data Visualization, Network Security, Risk Management, Security Architecture, Software-Defined Networking (SDN), Vulnerability & Threat Management, and Zero Trust